Using your reading in Chapter 4 as a guide and the threats that were listed in the Project Overview, write a 2 – 3 page paper that addresses the Threats and Vulnerabilities that a health insurance company may encounter. Note that you may have to look at what health insurance companies encounter and apply those to the scenario. Also address any compliance issues that the company may encounter. Keep in mind that they are in the middle of a merge and what unexpected things may appear.
1 attachments
Slide 1 of 1
attachment_1
attachment_1
UNFORMATTED ATTACHMENT PREVIEW
ISOL 533 PROJECT OVERVIEW • Write paper in sections • Understand the company • Find similar situations • Research and apply possible solutions • Research and find other issues PROMED INSURANCE • You are a paid Information Technology (IT) intern • ProMed Insurance, Inc. • Specializes in health insurance for three companies that have just merged • Headquartered in Seattle, Washington • Five other locations • • • • • Portland Oregon Phoenix, Arizona Los Angeles, California Boise, Idaho Las Vegas, Nevada • Over 1000 employees • $900 million USD annual revenue DATA CENTERS • Each location is near a data center • Managed by a third party vendor • Production centers located at the data centers PROMED INSURANCE, INC • ProMed Records • Handles medical records and sharing of information • Large institutions such as hospitals and research facilities • Small clinics • Allows clients / patients to look up their records, receive emails from doctors,etc. • ProMed Finance • Links clinics, hospitals and clients with insurance coverage • Accepts various payment methods including debit, credit cards and flexible spending plans • ProMed Connect • Clients / patients can find doctors, clinics, practitioners etc. in their network • Contains background and specialties of professionals PROMED INSURANCE IT NETWORK • Six corporate data centers • Over 2000 data severs • 700 corporate laptops • Mobile devices such as tablets used by nurses and nurses aides to record results MANAGEMENT REQUEST • Currently there are three different risk assessments • The merge has necessitated a new risk assessment be performed • Your assignment is to create a new one • Additional threats may be found during reevaluation • No budget has been set on the project THREATS IDENTIFIED • Loss of company data due to hardware being removed from production systems • Loss of company information on lost or stolen company-owned or vendor assets, such as mobile devices and laptops • Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on • Internet threats due to company products being accessible on the Internet • Insider threats • Changes in regulatory landscape that may impact operations
Purchase answer to see full attachment